The issue of end-user security is extremely important to prevent harm to people using
computer networks and systems. Both the provider and the end-user should improve
themselves in information security in order to protect themselves from cyber threats.
There are many steps until the information reaches the end-user. These steps first start with
the identification of a user by the provider. Identification is the section where the user briefly
introduces himself. It briefly proves to the provider that he is not a robot and is a real user.
But often this simple information is not enough and it needs to be verified, this is where
verification comes into play. Verification expects the user to prove who he really is. For
example, the user enters his phone number and confirms himself with the sms verification
code sent to his phone, or the user adds his e-mail address and verifies himself with the
incoming e-mail. This verification step is usually done once and then only authentication is
expected from the user. Authentication is the phase that questions whether the user is still the
same person as the source from which the user accesses the system changes.
In addition, an SSL certificate is needed for the website to be reliable. In short, SSL ensures
that the data exchange between the server and the web browser is encrypted. The SSL
certificate is a guarantee that this data exchange is reliable. Websites with SSL certificates
start as “http(s)://”, those that do not have “http://”
In addition, if we talk about CDN, thanks to the CDN (Content Delivery Network) method,
the end-user provides uninterrupted data communication. In short, CDN works like this; For
example, if the website that the server broadcasts is in the USA and we are connecting from
Turkey, CDN transmits a copy of this website to the nearest server and we can connect to a
copy of the site and access the data very quickly. Another thing that has a working principle
like CDN is VPN (Virtual Private Network). A device connected to the network using a VPN
exchanges data through the VPN provider to which it is connected. In other words, it would
be as if he had entered the site from another device and hid his IP address from the website he
was going to enter. Thus, they can ensure the security of their own information. Thanks to the
VPN, our digital footprints are not created (we can say cookies). Cookies are files in which
the sites we visit record our activities.
In fact, the most important part of information security is the protection of personal data and
this has been enacted by states. Although we can do everything over the internet, there are
many rules that providers must follow when storing users’ information. GDPR (General Data
Protection Regulation) is a law that covers personal data processing processes and includes sanctions for everyone residing in the European Union. KVKK (Personal Data Protection
Law) is a supervisory institution established to protect and monitor the personal data of
everyone residing in Turkey. Thanks to these laws, our data is protected.

